[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1011749: marked as done (ITP: interception-tools -- minimal composable infrastructure on top of libudev and libevdev)



Your message dated Wed, 10 Aug 2022 19:00:12 +0000
with message-id <E1oLqw8-002R1L-6j@fasolo.debian.org>
and subject line Bug#1011749: fixed in interception-tools 0.6.8-1
has caused the Debian Bug report #1011749,
regarding ITP: interception-tools -- minimal composable infrastructure on top of libudev and libevdev
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1011749: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011749
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Osamu Aoki <osamu@debian.org>
X-Debbugs-Cc: debian-devel@lists.debian.org, Ethan Djeric <me@ethandjeric.com>, Francisco Lopes <francisco@nosubstance.me>

* Package name    : interception-tools
  Version         : 0.6.8
  Upstream Author : Francisco Lopes <francisco@nosubstance.me>
* URL             : https://gitlab.com/interception/linux/tools
* License         : GPLv3
  Programming Lang: C, C++
  Description     : minimal composable infrastructure on top of libudev and libevdev

The Interception Tools is a small set of utilities for operating on input
events of evdev devices, including udevmon, intercept, uninput and mux.

In short, this is a generic helper tool to mangle keyboard input in very
low level within Linux kernel.  This works for Wayland, X, or Linux
virtual console.  Home position mod-tap etc. can be implemented using
this.

Longer explanation goes:

The tools here relying on libevdev are intercept and uinput.
intercept's purpose is to capture input from a given device (optionally
grabbing it) and write such raw input to stdout. uinput does the reverse,
it receives raw input from stdin and write it to a virtual uinput device
created by cloning characteristics of real devices, from YAML configuration, or
both.

So, assuming $DEVNODE as the path of the device, something like
/dev/input/by-id/some-kbd-id, the following results in a no-op:
intercept -g $DEVNODE | uinput -d $DEVNODE
In this case using -g is important so that the target device is grabbed for
exclusive access, allowing the new virtual device created by uinput to
substitute it completely: we grab it and others can grab the clone.
Now additional processing can be added in the middle easily.

There were Ubuntu PPA by Ethan Djeric <me@ethandjeric.com>.  I used it
as the starting point.  I have tidied up packaging so it can pass
piuparts and lintian test.  I also created manpages.

At this moment, I have this on github and in good shape.  Once accepted,
I will move this to salsa.

   https://github.com/osamuaoki/interception-tools

This offer 4 commands and one of it is "intercept". Debian already have
"intercept" in the "bear" package.

As you know generic name and short name are problematic.

I am wondering if I need to rename as:

  intercept -> evdev-intercept
  udevmon   -> evdev-udevmon
  uinput    -> evdev-uinput
  mux       -> evdev-mux

(I am asking thought of upstream too.)

Here are associated programs to give idea what we can.

Additional Tools
 uswitch: redirect stdin to a muxer if logged user matches
 xswitch: redirect stdin to a muxer if window matches
Official Plugins
  caps2esc:   transforming the most useless key ever in the most useful one
  space2meta: turn your space key into the meta key when chorded to
              another key (on key release only)
  hideaway: move the mouse pointer out of sight after a couple of seconds
  dual-function-keys: tap for one key, hold for another
Some Community Plugins
  ralt2hyper: Remap Right Alt (commonly AltGr) to Hyper (i.e. Control, Alt and Super)
  chorded_keymap
  interception-vimproved
  interception-k2k

Also, if Ubuntu PPA person wishes to co-maintain, I will be happy to
sponsor.

Regards,

Osamu

--- End Message ---
--- Begin Message ---
Source: interception-tools
Source-Version: 0.6.8-1
Done: Osamu Aoki <osamu@debian.org>

We believe that the bug you reported is fixed in the latest version of
interception-tools, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1011749@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Osamu Aoki <osamu@debian.org> (supplier of updated interception-tools package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 08 Aug 2022 10:31:20 +0900
Source: interception-tools
Binary: interception-tools interception-tools-compat interception-tools-dbgsym
Architecture: source all amd64
Version: 0.6.8-1
Distribution: unstable
Urgency: medium
Maintainer: Osamu Aoki <osamu@debian.org>
Changed-By: Osamu Aoki <osamu@debian.org>
Description:
 interception-tools - minimal composable infrastructure on top of libudev and libevdev
 interception-tools-compat - minimal composable infrastructure on top of libudev and libevdev
Closes: 1011749
Changes:
 interception-tools (0.6.8-1) unstable; urgency=medium
 .
   * Initially, I tried to reuse packaging by Ethan Djeric <me@ethandjeric.com>
     found in Ubuntu PPA.  Eventually I ended up redoing the entire packaging.
     I also addressed hardening, autopkgtest, manpages, non-native package
     format, updated dependency, etc..
   * Correct COPYRIGHT: GPL-3
   * Initial release. Closes: #1011749
Checksums-Sha1:
 fe4e4ec26807687f97157ea3a962fd0369c2ad24 2120 interception-tools_0.6.8-1.dsc
 09010f8a44879fe7e8145ea528cb2c1137a59e55 29124 interception-tools_0.6.8.orig.tar.xz
 1226a4f709bd713a2fa5ed381af72d42612811d8 4388 interception-tools_0.6.8-1.debian.tar.xz
 26717bc2620ad90ed8f5abc0192af965b6064bfa 1988 interception-tools-compat_0.6.8-1_all.deb
 37eb8175ac0a7a53a2b56da289c161577bae2a80 1900232 interception-tools-dbgsym_0.6.8-1_amd64.deb
 f83910f1283b770d7dac2b5fb92d3c1f4d9e9bb2 7823 interception-tools_0.6.8-1_amd64.buildinfo
 5ffd6652d8881b2d23bd382a928515cbd51fcea0 145600 interception-tools_0.6.8-1_amd64.deb
Checksums-Sha256:
 661288f39afad361013a5a30e6e668788a71bc4c747b3428411ae480b7efa74a 2120 interception-tools_0.6.8-1.dsc
 0c9089eb8cfaea5b9917f3f928ff87386f0a7d4138f4be2158da6ef306b07c60 29124 interception-tools_0.6.8.orig.tar.xz
 4d921a919c1c06e7135798a93cb925dcad27919103e88dcda87c06a85243a5cc 4388 interception-tools_0.6.8-1.debian.tar.xz
 3d64639634016d5efc816d8453c49ad3c8e10727138b9208aab23476915f07af 1988 interception-tools-compat_0.6.8-1_all.deb
 4a8da8c57cf9107644c2f72a6b7402948e912e58b1fade2492f2b3ffbda86c6e 1900232 interception-tools-dbgsym_0.6.8-1_amd64.deb
 4405a258e1eaae474d8bab8f21063338fcc9eacb6fa538a4e2301b7c22e36007 7823 interception-tools_0.6.8-1_amd64.buildinfo
 8a891f6b9223b6ec54abfabba50b61ff0828ae7cf43cbc1262bd10aa3829657a 145600 interception-tools_0.6.8-1_amd64.deb
Files:
 e9aa845727bf16e515e2c5f46addecb1 2120 admin optional interception-tools_0.6.8-1.dsc
 8331c56b2de75928b188bd21904cda5a 29124 admin optional interception-tools_0.6.8.orig.tar.xz
 0b8fc81f9e0df052a26286bc4d492d4d 4388 admin optional interception-tools_0.6.8-1.debian.tar.xz
 0013341b0e6ac77f6b68c33d0f0b33f4 1988 admin optional interception-tools-compat_0.6.8-1_all.deb
 b43fa8fb4ff7a5ea54d83fa90b66574a 1900232 debug optional interception-tools-dbgsym_0.6.8-1_amd64.deb
 076fe81203f62ea527615d513a263a2b 7823 admin optional interception-tools_0.6.8-1_amd64.buildinfo
 9cbb3516f2a964af0afb88a4c0bada58 145600 admin optional interception-tools_0.6.8-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=ejbj
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: